Professional Documents
Culture Documents
Guide To Maintenance Quick Reference of Huawei Optical Networking Devices
Guide To Maintenance Quick Reference of Huawei Optical Networking Devices
Revision Records
Contents
Keyword:
None.
Reference list:
None.
Course Description
Introduction
This manual is intended for OptiX optical network maintenance Egineers. It
consists of three parts:
3. Maintenance quick reference part: Commonly used maintenance
commands, precautions and related references are available in this part. Main
contents included are as follow:
Quick reference manual of commonly used command lines and returned errors.
Quick reference manual of common reset information returned by NE software.
Relationship between board models and types of devices
4. Network Management part:, common operations and troubleshootings of
NES, RMS and T2000 are available in this part.
5. Testing part: This part mainly concerns definitions and indices of common
optical interfaces and electrical interfaces.
:dbms-get-updatetime:”aps_fatal.dbf”,drdb;
DBMS update time : 2002-11-11 16:46:27
// Query the refresh time of the contents in multiplex section switching database
aps_fatal.dbf, and the last time when the database is written by NE software.
:dbms-set-backuptime:3*0*0; // Set auto database back up time of NE.
:dbms-set-autobackup:open; // Set auto database back up is enabled.
:dbms-query:"cfg_brr.dbf",drdb; // Query reset records of the board. The return
value indicates the board ID and reset time of a board with reset records. It can
record 100 effective records. The first one is ineffective. The second record
indicates that board 10 had reset once at 13:35:52 on November 9, 2002.
CFG_BRR.DBF
record num BID YEAR MONTH DATE HOUR MINUTE
SECOND
1 53 00000000 00 00 00 00 00
2 10 00002002 11 09 13 35 52
3 15 00002002 11 09 13 36 06
4 01 00002002 11 11 14 24 44
5 07 00002002 11 11 14 24 45
6 05 00002002 11 11 14 24 46
7 06 00002002 11 11 14 24 46
8 09 00002002 11 11 14 24 46
9 10 00002002 11 11 14 24 46
10 15 00002002 11 11 14 25 00
5 1 port-auto 0 ok
9 1 port-auto 1 rx_f
9 2 port-auto 2 rx_f
9 3 port-auto 3 rx_f
9 4 port-auto 4 rx_f
// Query ECC state of the optical interface. FIBER-PORT: optical interface
number in the opticl board; PORT-STATE: allocation status of channel numbers
in optical interface; port-auto: auto allocated; port-disable: manually and
forcefully disabled; port-enable: manually and forcefully allocated; LINK-CHAN:
allocate ECC by SCC board, and the value range is 0-19; LOGIC-CHAN-STATE:
current state of the channel. ok indicates ECC communication is in normal status;
rx_f means receiving ECC is ineffective; tx_f means delivering ECC is ineffective;
rx_ns means receiving ECC error codes; and tx_ns means transmitting ECC
error codes.
:ecc-get-tmnaccess;
TMN Access Mode
LAN Serial NeByLan
open open close
// Query NM access status. The return values LAN, Serial and NeBylan
represent Ethernet communication access, serial port communication access
and extend ECC communication access respectively.
:cm-control-tmn:nebylan,open; // Open the extend ECC of NE.
:ecc-get-bdtype;
BOARD TYPE
BID TYPE
0x05 one-port
0x06 one-port
0x09 four-port
// Query the optical interface types in the board, i.e. return the number of optical
interfaces of boards.
:cm-set-ip:132.134.16.5; // Set NE IP, and IP will not change with ID
changes.
:cm-set-subnet:8; // Set NE subnet ID (extend ID).
:cm-set-submask:255.255.255.0; // Set subnet mask.
:cm-set-gateway:132.134.16.1; // Set NE gateway.
:per-get-eid; // Query host performance event ID, i.e. the names of all
performance events in the NE.
represents all channels). lpbbe, i.e. lower order path background block errors, is
performance event code, and perall means all performance events.
:per-cancel-monevent:0,0,lpbbe; // Cancel the board
performance monitoring. The parameters are the same as above.
:per-set-starttime:15m&24h,1997-12-1,12*23; // Set 15 minutes and in 24
hours performance monitoring start time of NE.. The forms of date and time are
the same as in date & time commands.
:per-get-starttime:15m&24h; // Query 15 minutes and in 24
hours performance monitoring start time of NE.
:per-set-endtime:15m&24h,1990-0-0,0*0*0; // Set 15 minutes and in 24 hours
performance monitoring end time of NE 1990-0-0,0*0*0 is the current time.
:per-get-endtime:15m&24h; // Query 15 minutes and in 24
hours performance monitoring end time.
:per-set-autorep:1,2,perall,15m&24h; // Set auto reporting of one
performance events periodically. The value 1 is the board position (0 represents
all boards). Value “2” represents the channel (0 represents all channels).
:per-cancel-autorep:0,0,lpbbe,24h; //Cancel periodic auto reporting
of a certain performance event. It is suggested not to set performance auto
reporting, because a large quantity of data will be reported to the NM,
interrupting the communication between the NE and the NM, and therefore
causing shutdown of NM.
:per-init; //Initialize NE performance parameters, and
unify performance monitoring status of each board and channel.
:per-get-curdata:0,0,perall,24h; //Query current 24 hours performance status
of all the boards and channels are in.
:per-get-hisdata:0,0,perall,15m,1,3; //Query 15 minutes history
performance status of all the boards and channels. The value “1” means to start
from the first register, and "3" means to stop by the third register. For 15 minutes
performance monitoring, numbers are from 1 to 16 and for 24 hour performance
monitoring, numbers are from 1 to 6. Note: This command in 155622 device is
different.
:per-clr-curdata:0,0,perall,15m; //Clear all the 15 hours current
performance event data in all the boards and channels, i.e. clear all the registers.
:per-clr-hisdata:0,0,perall,15m,1,3; // Clear all 15 hours history
performance data in all the boards and channels. The last parameter values
mean to clear registers from 1 to 3. Note: This command in 155622 device is
different.
:login:1,”nesoft”;
//Login the NE. “1” is user ID. Each user can have only one identification. There
are three default NE users for all OptiX devices. Default user names and their
corresponding passwords are as follows:
NE user ID User name Password Level
1 szhw nesoft 253
2 root password 63
3 honet huawei 63
The returned prompt is :szhw> when login with ID 1. If you login with a certain
user name, you can only create, delete or modify the users whose level is lower
than yours. There is only one user at level 253. So login with szhw can create or
delete other users, and modify other user’s level. But three default users cannot
be deleted and their levels cannot be modified. The password can only be
modified the user himself. No user has the right to modify the password of any
other user. Level distribution of NE users is as below:
1~15: Login level. The user can only execute a part of basic unrestricted
commands.
16~31: Query level. The user can only use the login level commands and query
commands.
32~47: Configuration level. The user can use the commands of login level and
query level, except system commands.
48~63: System level. The user can use all the commands.
Only some basic operations are available even if you login as administrator in
NM but as a login level user in NE.
:um-get-alluser;
USERS
USER-ID USER-NAME USER-PRIORITY
1 szhw 253
2 root 63
3 honet 63
//Query all NE users owned by the NE. USER-PRIORITY means user level.
:um-add-user:"user",4,"sdh",63; //Add the fourth NE user at level 63, with
the user name “user”, and password “sdh”.
// Query versions of NSF1, NSF2 and extend BIOS. 155622 device does not
support this command.
:sys-get-curnesoft;
current run nesoft is
NSF2
// Check whether NSF1 or NSF2 is the current host software. 155622 device
does not support this command.
:ver;
Huawei Cop, SBS2500+ & 10G BIOS 6.03, WatchDog Enable
NeSoft(P) 4.05.03.12P02 <Jun 27 2002 17:50:00>
// Query basic BIOS, and current host software version.
:errlog; // Query the numbers of host software resetting and
error records.
:reset; // Reset the host software, equal to pressing RST on
SCC board.
:cfg-get-stgpara;
SYNC : ex18k
OUTSYN_MODE : byte byte
SYN BOLT : 0
SA BYTE : sa4 sa4
SYNC CLASS : ex18k e1s8k intr 0xff 0xff 0xff 0xff
// Query parameters of device clocks. There are eight clock sources in 155622
device: e1s8kw1s8k, e2s8k, w2s8k, adm8k, ex18k, ex28k and intr.
OUTSYN_MODE is the mode of output clock source. SYN BOLT is threshold
value of clock source. The meaning is the same as 2500+ device. SA BYTE is S1
byte time slot of 2Mbits clock source. SYNC CLASS is the tracing level of the
clock source.
:cfg-get-ssmpara:source=0
Sync Source List
Source Bid BdType Port Prio ID QL Lock SF
e1s8k 12 sl4 0xff 1 0x00 0x0f 0 0
intr 16 stg 0x02 2 0x00 0x0f 0 0
// Query currently configured clock source. Port is the input port of the clock. Prio
is the tracing priority level of the clock. ID is the clock source ID. QL is the clock
quality, i.e. 0x02, 0x04, 0x08, 0x0b or 0x0f. Lock indicates whether the clock
source is locked tracing. SF indicates whether the clock source has lost effect;
“0” indicates the clock source is effective, and “1” indicates it is ineffective.
:cfg-get-ssmpara:dest=0
Sync Dest List
No. Bid BdType Port INHIBIT
1 12 sl4 0xff 0
// Query current clock sink list. INHIBIT indicates whether the clock source
switching is prohibited; “0” means not prohibited, and “1” means prohibited.
:cfg-get-ssmpara:fettle=0
SSM State
CurrSource State PllSource MainSTG IDState
e1s8k 0x2a intr 16 0
// Query the state of current clock source. “State” is state of starting SMM
protocol. “0x2a” means the protocol is starting, and “0x1a” indicates the protocol
is already started. “PllSource” is phase locked source of 2M clock. “MainSTG” is
the position of the working clock board. “IDState” means whether the SSM
protocol is used; “0” means not used, and other values mean used. Currently, the
device does not support IDState.
:ecc-get-sccinfo;
SCC INFO
SCCCH STATE EVENT LU_BOARD RX_SR TX_SR LAST_I_S
LAST_TS RX_BYTES TX_BYTES LAST_RX_S LAST_TX_S
0 rx_f 2 11 0 0 2 2002-11-13 15:24:24 0x00000000
0x00000018 1990-0-0 0:0:0 2002-11-13 15:24:26
1 ok 10 12 0 0 0 2002-11-13 15:23:21 0x0000043b
0x000004ac 2002-11-13 15:24:26 2002-11-13 15:24:26
2 rx_f 0 0 0 0 2 2002-11-13 15:23:21 0x00000000
0x00000000 1990-0-0 0:0:0 1990-0-0 0:0:0
3 rx_f 0 0 0 0 2 2002-11-13 15:23:21 0x00000000
0x00000000 1990-0-0 0:0:0 1990-0-0 0:0:0
6 rx_f 0 0 0 0 0 2002-11-13 14:37:22 0x00000000
0x00000000 1990-0-0 0:0:0 1990-0-0 0:0:0
7 rx_f 0 0 0 0 0 2002-11-13 14:37:22 0x00000000
0x00000000 1990-0-0 0:0:0 1990-0-0 0:0:0
8 rx_f 0 0 0 0 0 2002-11-13 14:37:22 0x00000000
0x00000000 1990-0-0 0:0:0 1990-0-0 0:0:0
PER_ERRCODE_NULL_TIME15 0x5000
PER_ERRCODE_NULL_TIME24 0x5001
PER_ERRCODE_EARLIER_TIME15 0x5002 The time of 15 minutes performance is earlier than
the current time.
PER_ERRCODE_EARLIER_TIME24 0x5003 The time of 24 hours performance is earlier than
the current time.
PER_ERRCODE_INVALID_PARAMETER 0x5004 Invalid parameters
SSA1SL6402
I-64.2 1550 0-16.4 -2 -17 -1 360
SSA1SL6422
SSA1SL6403
SSA1SL6413 S-64.2b 1550 0-25 0 -17 -1 800
SSA1SL6423
SSA1SL6405
L-64.2b 1550 30-70 14* -17 -3 1600
SSA1SL6425
SSA1SL6406
V-64.2a
SSA1SL6426
The symbol “*” indicates that the optical power should be realized together with
opticcal amplification board.
Boards in italics above are currently shipping boards, used to replace boards
with the same type.
SS24SL4 and SS15SL1 boards are SC/PC interface boards, and the others are
FC/PC interface boards.
0315831011000035 -SS72TWC19-192.9PL
| | | |
Basic bar code information board name frequency type and distance
2.1 NES NM
Run NES NM. Open the menu “Help/About OptiX iManager NES (A)...”. The
interface popped up includes the version information.
The default user name is “Admin”, with the password “sdh”.
2.2 RMS NM
(1) Right click on the blank area in the screen. Select Program/Terminal. Open
the database with user “sa” in the command window:
isql -SSYB -Usa –Psybaseadm
(2) Execute the command below to dump mib database into a file. (Note: Make
sure that there is enough space in the file system for storing the file. The
command df –k can query the remaining space of the file system.)
1>dump database mib to "/usr/local/rms/mib.dump"
2>go
This function is to dump the database mib of RMS into the file mib.dump under
the directory /usr/local/rms. If NM software is reinstalled, the previous database
can be recovered with this file.
Steps to recover the previous database:
(1) Open the database with username “sa”:
2005-06-07 Huawei Confidential. No disclosure without permission. Page 41 of 72
Guide to Maintenance Quick Reference of Huawei Optical Networking Confidentiality Level:
Devices Internal Use Only
Run RMS NM. Open the menu “Help/About SBSMN-RMS...”. The interface
popped up includes the version information.
User name Password
Login to Solaris rms sbsrms
Login to RMS admin Password is empty
Switch to super user root rootkit
I. Computer type
Observe directly from the front of the host, such as Ultra 5, Ultra 60 and E450.
Right click on the blank area in the screen. Select Program/Terminal. Input
“prtconf –V” command in the command window.
OBP version returned is the PROM version.
For example, if the returned value is OBP 3.23.1 1999/07/16 12:08, then 3.23.1
is PROM version.
When starting the computer, find out the information firstly displayed in the first
line in SUN icons on the right. For example, “SunOS SPARC II 450M*2 512M”
indicates that the computer has two SPARC II CPUs, with a frequency of
450MHz and the memory capacity is 512M.
Right click on the blank area in the screen. Select Program/Terminal. Input
“showrev” command in the command window.
The returned information includes OS Release information. Subtract 3 from this
information to get Solaris version. For example, if OS Release is 5.5.1, Solaris
version is 2.5.1; If OS Release is 5.6, Solaris version is 2.6.
V. Sybase version
Method one: Right click on the blank area in the screen. Select
Program/Terminal. Input the commands below in the command window.
/usr/sybsys/bin/isql -SSYB -Usa -Psybaseadm
1>select @@version
2>go
The return information is Adaptive server Enterprise/11.5.1/P...Here, 11.5.1 is
Sybase version. Input
1>quit
to quit.
Method two: Right click on the blank area in the screen. Select Program/Terminal.
Input the command below to edit Sybase log file in the command window.
vi /usr/sybsys/install/SYB.log
Input G to get to the end of the file. Then search the contents of “Adaptive server
Enterprise/11.5.1/P...” from back to front. The version information is the last
version started by the system.
Press “ESC" and in vi command status, input q! to quit.
Right click on the blank area in the screen. Select Program/Terminal. Input the
command “ifconfig –a” in the command window. In the section starting with hme0
in the returned information includes IP address and subnet mask information.
Note: The subnet mask is in hex. For example, “ffffff00” represents
255.255.255.0.
Right click on the blank area in the screen. Select Program/Terminal. Input “su”
in the command window. Press Enter, and input password: rootkit and press
Enter to switch to super user. (If super user password is modified, enter
corresponding password). Input “format” to query capacity of each hard disk.
Select 0 for the first disk, and 1 of the second, and so on. Then select verify to
view hard disk information. Enter “quit” to quit.
I. Switch on
There are two methods available to start Sun workstation. The first one is to
power on the switch at the back of the host. The other is to press the Power key
on the keyboard.
Right click on the blank area in the screen. Select Program/Terminal. Input su in
the command window and press Enter. Input the password “rootkit” and press
Enter to switch to the super user. Input “/usr/sbin/shutdown -y -g0 -i5”, or input
“init 5” to turn the workstation off.
If the workstation is out of work abnormally, press STOP and A together on the
keyboard. After the system displays “OK”, input “boot” or “sync” to restart the
system. After the system is restarted, it is suggested to take up super user rights
in the command window and input “fsck –y” to fix the data in hard disk
automatically.
You can use the command “pwd” to judge your current directory. For example,
% pwd
/usr/home/rms
To switch into another directory, use the command “cd”. Besides, this command
not only accepts absolute path, but also accepts relative path.
Usage: cd [directory]
Examples:
%cd Return to the home directory.
%cd / Enter into the root directory of the system.
%cd .. Enter into the upper directory.
%cd ../.. Enter into the directory two layers upper.
%cd /usr/local/work/bin Enter the directory /usr/local/work/bin through the
absolute path
%cd ../mibinit Enter the directory /usr/local/work/mibinit
through relative path
Generally, creating a new subdirectory under your main directory is done with the
command mkdir. When using mkdir, the path can be absolute path or relative
path.
Usage: mkdir directory-name
Example: % mkdir /usr/home/rms/data
Certainly, if current directory is /usr/home/rms, the above command can be
shortened as: % mkdir data
Before deleting a directory, make sure the directory is empty. Otherwise, delete
files under the directory beforehand. Besides, the current directory cannot be
deleted.
Usage: rmdir directory-name
Example: % rmdir /usr/home/rms/data
Certainly, if the current directory is /usr/home/rms, this can be shortened as:
% rmdir data
Use the command “ls” to list contents, including files and subdirectories, under a
specific directory. With options following the command, information, such as file
size, type, rights, creation and modification date, can also be listed.
Usage: ls [options][parameters]
If there is no parameter in the command line, contents under current directory will
be listed with the command ls. This command has many useful options, which
can be used together. Add the prefix "-" before each option.
-a List all files, including hidden files (files headed with dot, such as .login)
-F Indicate file type with suffix symbols. The meaning of each symbol is listed
below:
/ directory file
= socket file
@ symbolic link file
* executable file
-1 Giving a long list of information about the file, including file type, rights, link
information, file owner, group, size and recent modification date. If the file is a
symbolic link file, there is “->”symbol pointing the linked file after the file name.
Examples:
%ls -lF
302 in total
-rw-r--r-- 1 rms sbsrms 217512 March 16 20:39 RMSApplication
drwxr-xr-x 2 rms sbsrms 512 May 3 13:58 animal/
drwxr-xr-x 3 root other 512 May 3 14:47 cgl/
drwxr-xr-x 2 root other 512 May 3 09:41 cyf/
drwxr-xr-x 2 root other 512 May 3 11:19 hub/
-rw-r--r-- 1 rms sbsrms 296 2000 January 2 mbox
drwxr-xr-x 2 root other 512 May 3 10:09 pzj/
-rw-r--r-- 1 rms sbsrms 225575 May 09:28 scr1
-rwxr-xr-- 1 root root 46098432 May 16:02 sdh*
-rw-r--r-- 1 rms sbsrms 1310854 May 09:21 snapshot.rs
drwxr-xr-x 2 root other 512 April 12 12:00 test/
In the long list of file information, the first item indicates the file type and authority
information, 10 characters in total. The first character indicates the file type. The
file types indicated by each character are as follows.
d directory
- common file
The function of the command “cp” is to copy contents in a file into another file.
Usage: cp [options] source file target file
See the options of cp command below.
-i interactive operations (waiting for confirmation before execution)
-r Recursive copy directory (To copy files and subdirectories under a directory,
and files and subdirectories under its subdirectories,up to the lowest layer of the
directory)
Example:
% cp old_filename new_filename
The command “mv” is to move a file, or to rename a file. The difference is that
when a source file and a target file in the same directory, the function is to
rename the file, otherwise, it is to move the file.
Usage: mv [options] source_file target_file
See the options of mv command below.
-i Interactive operations (waiting for confirmation before execution)
-f Disable the interactive operations.
Example: % mv old_filename new_filename
To set the rights “file2” file as readable and writable to all users, the chmod
command is used as:
% chmod a=rw file2
Usage of chmod in number mode: chmod lmn [parameters]
The item “lmn” represents three numbers, and each of them is owner rights,
other users’ rights in the same group, and the rights of other users in the same
system.
r = 4, w = 2, x = 1 and - = 0
For example:
-rwxr-xr-- 1 rms sbsrms 46098432 May 12 16:02 sdh*
The rights of the “sdh” file can be expressed as “rwxr-xr--" in symbols, and as
754 in numbers. (7=4+2+1, 5=4+0+1, and 4=4+0+0)
Example:
To set the rights of “file1” file as, the owner has rights to read, write and execute,
other users in the same group has reading and execution rights, and other users
in the system are given rights to read and execute. The command chmod is used
as
% chmod 755 file1
The command chown is used to change the file owner. But in most of the UNIX
systems, this command can only used by super users. In other words, common
users cannot change file ownerships.
Usage: chown [options]
See the options of the command below.
-R Recursive directory
-f Forcefully execute the command, and no error report
Examples:
# chown new_owner file
Any user can use “chgrp” command to change his files from one user group into
another user group. Obviously, the user should belong to both user groups at the
same time.
Usage: chgrp [option] user group file
See the options of the command below.
-R Recursive directory
-f Forcefully execute the command, and no error report
Examples:
2.3 T2000
Do not change the other parameters. Click OK, and database backing up will be
completed. Select iMapAlarmDB, iMapLogDB, iMapSecurityDB, iMapTopoDB in
turn from the Database pull down menu and perform the same operation to
complete the backup process.
Database restoration:
Start the NM T2000. Open the menu “Help/About”, and an interface containing
version information will pop up.
Close T2000 NM server. Right click on the blank area in the screen, and select
Program/Terminal. Then input cd /T2000/server/database in the command
window and press Enter. Input ls and press Enter again. Find out the file
backupmo.bat. Input backupmo.bat and press Enter to run it directly. The backup
file is saved under /T2000/server/database/mo directory.
Close T2000 NM server. Right click on the blank area in the screen, and select
Program/Terminal. Then input cd /T2000/server/database in the command
window and press Enter. Input ls and press Enter again. Find out the file
restoremo.bat. Input restoremo.bat and press Enter to run it directly. The system
will restore the backup file under /T2000/server/database/mo directory
automatically.
2005-06-07 Huawei Confidential. No disclosure without permission. Page 52 of 72
Guide to Maintenance Quick Reference of Huawei Optical Networking Confidentiality Level:
Devices Internal Use Only
Run T2000 NM. Open the menu “Help/About”. Version information is in the
popped up interface.
Operation
Classfication Item Implementation method Effects on online services Risk level
suggestions
Main Menu- View- Equipment No effect on services, but
NE extend ID Maintenance Console-NE could result in Advise not to
General
modification Communication-Communication communication interruption perform
Parameter setting between NM and NE.
Main Menu- View- Equipment Do not modify
NE name modification Maintenance Console –Common No effect under normal General
Configuration-NE Attribute situation
Main Menu- View- Equipment
Do not modify
NE gateway Maintenance Console-NE
No effect under normal General
modification Communication-Communication
situation
Parameter setting
Modify
NE settings Main Menu- View- Equipment
NE IP address Maintenance Console-NE Advise not to
No effect General
modification Communication-Communication perform
Parameter setting
Main Menu- View- Equipment
No effect on services, but NM
NE user and password Maintenance Console-NE Security Advise not to
computer cannot accesses General
modification Management–NE User perform
NE.
Management
Deleting protection
Add/Delete NE logic Implemented by modifying subnet/logic system will lead Advise not to
Dangerous
system protection subnet at NM side to service interruption, but perform
adding has no effect.
Creating and deleting boards
Main topology-Double click has no effect on service.
Add/Delete board NE-Right click on slots to Boards configured with General
add/deleted boards services are not allowed to
delete by NM.
Main Menu- View- Equipment
Under NE normal running
Maintenance Dangerous
state, there is no effect on
Back up board Console-Maintenance-NE operation,
services. The operation Dangerous
configuration Configuration Data advise not to
should be be performed
Management-Backup board perform.
when NE is in normal state.
configuration
Circuit board
operation Adding standby clock board
has no effect on current
services. Modify the board
configuration of logic system
after adding standby
Add standby Main topology-Bouble click
cross-connect board in
cross-connect NE-Right click on the slot to add General
155/622 devices, and
board/clock board board
services will be influenced.
Nevertheless, services on
2500+ and 10G MADM
devices will not be
influenced.
Main Menu- View- Equipment
Orderwirr number
Maintenance Console-SDH No effect General
modification
Modifying Configuration-Overhead interface
orderwire Main Menu- View- Equipment
configuration RAX value modification Maintenance Console-SDH
No effect General
of order wire telephone Configuration-Overhead interface
-Select an orderwire interface
Circuit board
interface Modify J1 and C2 bytes Main Menu- View- Equipment When interconnected Dangerous Dangerous
Maintenance Console-SDH devices are both produced by operation,
2005-06-07 Huawei Confidential. No disclosure without permission. Page 54 of 72
Guide to Maintenance Quick Reference of Huawei Optical Networking Confidentiality Level:
Devices Internal Use Only
Operation
Classfication Item Implementation method Effects on online services Risk level
suggestions
Configuration-SDH Overhead Byte Huawei, J1 byte modification advise not to
Management-Higher Order Path under default conditions has perform.
Overhead no effects on services.
However, when
interconnecting with other
vendor’s equipment, it is
necessary to understand
their equipment.
C2 byte modification will
cause service interruption.
Main Menu- View- Equipment
Maintenance Console-SDH
Modify path impedance Configuration-PDH interface-Select Service can be interrupted Dangerous
attribute
By Board/Port(Path)-Path-Path
Impedance
Main Menu- View- Equipment
Maintenance Console-SDH
No need to
Tributary timing mode Configuration-PDH interface-Select Service can be interrupted Forbidden
perform
By Board/Port(Path)-Board
-Tributary timing mode
No effect on services under
Main Menu- View- Equipment normal condition.
Tributary protection Maintenance Console-SDH Modification errors will lead to
Dangerous
attribute Configuration-PDH interface-Select abnormal switching, and
By Function-Path Protection service will be also be
effected
Main Menu- View- Equipment When the device is in normal
Add/delete Maintenance Console-SDH running state (no switching),
Add/Delete services General
services Configuration - SDH Service other services will not be
Configuration influenced.
Main Menu- View- Equipment
Maintenance
Operations on
Back up NE database Console-Maintenance-Configuration No effect General
NE database
Data Management–Backup NE
database
Main Menu- View- Protection View
Existing services should be
Select protection subnet and right
Adding standby logic deleted first, and this will
click-select Delete Protection
system online to 1+1 interrupt the services. Dangerous
Subnet
protection Creating protection subnet
Right click on protection view-select
has no effect on services.
Create- 1+1 MSP
Main Menu- View- Protection View
Existing services should be
Select protection subnet and right
Adding standby logic deleted first, and this will
click-select Delete Protection
system online to 1:N interrupt the services. Dangerous
Subnet
protection Creating protection subnet
Right click on protection view-select
has no effect on services.
Create- M:N MSP
Protection
Deleting SNCP node will Dangerous
settings Main Menu- View- Protection View
Add/Delete SNCP break services. Adding operation,
Right click on the node- select Dangerous
nodes SNCP node has no effect on advise not to
Create SNCP node
service perform.
Main Menu- View- Protection View Dangerous
No effect on services under
Modify MSP WTR time Select protection subnet and right operation,
normal state. Services will Dangerous
and trigger conditions click-select Protection Subnet advise not to
break under switching state.
Attributes perform.
Main Menu- View- Protection View Under normal state, Not
Start/stop MSP Select protection subnet and right starting/stopping of protocol recommended
Dangerous
controller click-select Protection Subnet controller on a single node to perform in
Attributes will not affect services. normal running
Operation
Classfication Item Implementation method Effects on online services Risk level
suggestions
starting/stopping Two or state
more NE protocols will affect
services.
Not
Optical Main Menu- View- Equipment
recommended
Loopback interface/Electrical Maintenance Console-SDH Service Loopbacked
to perform in Dangerous
operation interface/VC4/Tributary Configuration-PDH interface (SDH port/VC4 will break.
normal running
loopback interface)
state
Main Menu- View- Equipment
Whether to use the Maintenance Console-Common
Service will be not
second input power of Configuration- Set Environment General
interrupted.
PMU Monitor-PMU interface-Basic
attributes
PMU settings
Main Menu- View- Equipment
Environment
Maintenance Console-Common
monitoring temperature
Configuration- Set Environment No impact General
lower and upper
Monitor-PMU interface-Temperature
thresholds
attributes
Not
Main Menu- View- Equipment recommended
Optical channel will be
Laser switch operation Maintenance Console-SDH to perform in Forbidden
interrupted
Configuration-SDH interface normal running
state
Laser settings
Not
Main Menu- View- Equipment
recommended
Automatic laser Maintenance Console-SONET
Affects path protection ring to perform in Forbidden
shutdown Configuration-Automatic Laser
normal running
Shutdown
state
Not
Main Menu- View- Equipment recommended
Clock priority
Maintenance Console-Clock No impact to perform in General
modification
Configuration- Clock Source Priority normal running
state
Not
Main Menu- View- Equipment Affects network
recommended
Set clock source Maintenance Console-Clock synchronization. Wrong
to perform in General
restoration parameters Configuration- Clock Source settings will have long-term
normal running
Modifying Restoration Parameter effect on services.
state
clock
configuration Not
Main Menu- View- Equipment Affects network
recommended
SSM output control Maintenance Console-Clock synchronization. Wrong
to perform in General
modification Configuration- Clock Subnet settings will have long-term
normal running
Setting- SSM Output Control effect on services.
state
Not
Main Menu- View- Equipment Affects network
recommended
Clock source quality Maintenance Console-Clock synchronization. Wrong
to perform in General
modification Configuration- Clock Subnet settings will have long-term
normal running
Setting- Clock Source Quality effect on services.
state
Main Menu- View- Equipment
Alarm Alarm suppression / Maintenance Console-Alarm- Set
No impact General
settings Inversion Alarms- Set Alarm Reversion (Set
Alarm Suppression)
Not
Depend on alarm type
Main Menu- View- Equipment recommended
inserted. MS-AIS and
Alarm insertion Maintenance Console-Alarm- Alarm to perform in Dangerous
MS-RDI alarms will affect
Insertion normal running
services.
state
Operation
Classfication Item Implementation method Effects on online services Risk level
suggestions
NE Alarm Attributes
Whether to insert AIS Main Menu- View- Equipment
Do not use this
when there are excess Maintenance Console-Alarm-Set No effect General
function
bit errors QoS- Set AIS Insertion Switch
Main Menu- View- Equipment
Set alarm attributes Maintenance Console-Alarm- Set No effect General
NE Alarm Attributes
Main Menu- View- Equipment
Maintenance Console-
Set performance
Performance- Performance Setting- General
monitoring time No effect
Set Performance Monitoring
Performance Start/Stop Status
settings Main Menu- View- Equipment
Performance Maintenance Console-
monitoring object and Performance- Performance No effect General
auto report state Setting-Set performance monitoring
object
Dangerous
Main Menu- View- Equipment
operation,
Reset the borard Maintenance Console- Service will be interrupted Dangerous
advise not to
Maintenance- Reset Board
Reset perform.
operations Service will not influenced Dangerous
Main topology- double click NE to
under normal state, but will operation,
open board layout-Right click on Dangerous
Reset SCC be influenced under MS advise not to
SCC board- select Reset
switching state. perform.
Main Menu- View- Equipment Dangerous
TDA internal and
Maintenance Console-SDH operation,
external timing Service will be interrupted Forbidden
Configuration- TDA Interface-TDA advise not to
modification
clock source configuration perform.
Clicking “Delete Fiber Cable”
will influce services (The
Main menu- Topology- Fiber/Cable precondition of this operation
Modifying fiber/cable General
Management is to delete services and
protection subnet on the
fiber. )
Main menu- Configuration- Dangerous
Configuration Data Management- operation,
Download NE data Service will be interrupted Forbidden
Other Configuration Data advise not to
operations Upload/Download perform.
Main Menu- View- Equipment
Fan parameters Maintenance Console-Common Advise not to
No effect Forbidden
settings Configuration- Set Environment perform
Monitor- Set Fan
Services in test channel and
2M Pseudo-random Main Menu- Maintenance- 2M Advise not to
in 63th channel of PQ1 will be General
number test Pseudo Number Test perform
interrupted.
Main Menu- View- Equipment
Maintenance Console-SDH Services in use should be set
Path service load
Configuration-PDH interface-Select as load. Otherwise, services General
indication modifications
By Board/Port(Path)-Path- Service will be influenced.
Load Indication
Dangerous
operation, and
Add/delete service Main Menu- Configuration- SDH
do not add or
under MSP switching configuration- SDH Service Services will be influenced. Forbidden
delete services
state Configuration
under this
state
I. Index meaning
1) STM-1 interface
Intra-office and short haul: -8dbm ~ -15dbm;
Long haul: 0dbm ~ -5dbm
2) STM-4 interface
Intra-office and short haul: -8dbm ~ -15dbm:
Long haul: 2dbm ~ -3dbm
3) STM-16 interface
Intra-office: -3dBm ~ -10dBm;
Short haul: 0dBm ~ -5dBm;
Long haul: 3dBm ~ -2dBm
I. Index meaning
Suppose the mean optical power is A when all optical data are “1”s, and it is B
when all optical data are “0”s. The extinction ratio is
A
EX=10lg B .
Too high extinction ratio will lead to chirps, wider spectral and bigger dispersions.
Low extinction ratio, however, will lead to difficulties in distinguishing 1 and 0 by
the receiver. Only the minimum extinction ratio is specified in the protocol.
Note: We only specify the minimum extinction ratio. In our tests, we set the
extinction ratio of 2500M no higher than 10dB.
1) STM-1:
Intra-office and short haul: 8.2dB;
Long haul: 10dB
2) STM-4:
Intra-office and short haul: 8.2dB;
Long Haul: 10dB
3) STM-16:
Intra-office, short haul and long haul: 8.2dB
I. Index meaning
1) STM-1:
Intra-office: -23dBm;
Short haul: -28dBm;
Long haul: -34dBm
2) STM-4:
Intra-office: -23dBm;
Long haul and short haul: -28dBm;
3) STM-16:
Intra-office and short haul: -18dBm;
Long Haul:
L-16.1: -27dBm;
L-16.2: -28dBm;
L-16.3: -27dBm
I. Index meaning
1) STM-1:
Intra-office and short haul: -8dBm;
Long haul: -10dBm
2) STM-4:
-8dBm
3) STM-16:
Intra-office and short haul: 1dBm;
Long haul:
L-16.1: 1dBm;
L-16.2: 2dBm;
L-16.3: 1dBm.
I. Index meaning
Optical path penalty is the total dispersion penalty introduced due to reflection,
inter-symbol interference, mode partition noises, and chirps in laser. Dispersion
is introduced to the signal because of the light from the optical transmitter is not
so ideal, and due to the reflection at the laser, etc. So, it should be processed at
the receiver. Therefore, optical path penalty explains performances at both the
transmitter and the receiver.
Note:
Inter-symbol interference is the interference between the codes 1 and 0.
Mode partition noise is the dispersion caused by different frequencies of
multi-longitudinal modes.
Chirps in the laser are amplitude uprushes of the laser.
1) STM-1:
1dB;
2) STM-4:
1dB;
3) STM-16:
Intra-office and short haul: 1dB;
Long haul:
L-16.1: 1dB;
L-16.2: 2dB;
L-16.3: 1dB.
I. Index meaning
The index is mainly to test phase locked loop ability of the receiver, and
permitted frequency deviation at optical input interface.
±20ppm
原来信号
向前抖的信号
向后抖的信号
1. Index
2. meaning
Because signals are influenced by system clock, chip threshold, etc., output data
will shift forwards and backwards. When the fore-and-aft shifting frequency is
bigger than 10HZ, the phenomenon is considered as a jitter. High amount of jitter
will have negative effects on the downstream station.
Measurement unit of jitter is UI. UI is the reciprocal of optical transmission bit
rate.
1
STM-1: UI= 155M =6.43ns;
1
STM-4: UI= 622M =1.61ns;
1
STM-16: UI= 2500M =0.40ns.
I. Index definition
I. Index meaning
Simply, this is the maximum tolerable peak-to-peak jitter or wander of the device,
when SDH analyzer adding jitter or wander on input data at optical interface. It
should not be lower than the values in specification
The actual tested waveform should be on top of the template. Otherwise, the test
fails.
Note: Tests below are all concerned with G.958 template.
I. Index meaning
Output interface signals bit rate is the number of bits transmitted per second. AIS
bit rate is the number of bits per second when transmitting AIS signal.
I. Index meaning
When the input interface receives signals with specified frequency deviation, the
input interface can still work properly (without giving any bit errors in the device).
This index is mainly to test the phase locked loop ability of the receiver.
I. Index meaning
In the equipment room, the output interface and the input interface are
connected with cables. The signals will be attenuated on the cable from the
output to the input. Attenuation permission at the input interface means that the
input interface can still work properly after receiving the signals that have
undergone attenuation on the standard cable.
Interface rate Attenuation range (dB) Standard attenuation cable length (M)
1.5M interface * 300
2M interface 0~6 300
34M interface 0~12 150
45M interface * 150
140M interface 0~12 70
155M interface 0~12.7 70
2MHz synchronous interface 0~6 300
Note: At present, the test indices are mainly concerned with 2M and 155M
electrical interfaces.
I. Index meaning
I. Index meaning
2048~3072 ≥14
34M input interface 859.2~1718.4 ≥12 75
1718.4~34368 ≥18
34368~51552 ≥14
45M input interface 75
140M input interface and output 7000~210000 ≥15 75
interface
155M input interface and output 8000~240000 ≥15 75
interface
2048kHz synchronization interface 2,048 ≥15 75 or 120
Note: At present, only 140M and 155M specify reflection attenuation at output
interface.
I. Index meaning
I. Index meaning
Simply, the maximum jitter or wander peak value that the equipment can tolerate,
when SDH analyzer applies jitter or wander to input data at the optical input
interface. It should not be lower than the specified value.
A0
Characteristics of a
A1
A2
f0 f1 f2 f3 f4
T1302220-93/d03
Frequency (Hz)
FIGURE 3/G.824
Mask of peak-to-peak jitter and wander which must be accommodated
at the input of a node in a digital network
[Measurement method – refer to Supplement No. 3.8 (O-Series)
and Supplement No. 35 (G-Series)]
Figure 3-1 Input jitter and wander tolerance mask at Tributary interface (1.5M series)
2. Index definition
Values of jitter and wander tolerance mask at Tributary interface (1.5M series):
Interface rate Peak-to-peak jitter & wander Frequency (Hz)
value
A0 A1 A2 F0 F1 F2 F3 F4
1.5M 18 5 0.1 −5 10Hz 120Hz 6kHz 40kHz
1.2×10 Hz
45M 18 5 0.1 −5 10Hz 600Hz 30kHz 400kHz
1.2×10 Hz
Peak-to-peak jitter
and wander amplitude Characteristics of a
(log scale) typical frame aligner
A0
A3
Slope equivalent
to 20 dB/decade
A1
A2
Jitter frequency
(log scale)
f0 f10 f 9 f8 f1 f2 f3 f4
T1816970-92/d03
FIGURE 3/G.823
Lower limit of maximum tolerable input jitter and wander
Figure 3-2 Input jitter and wander tolerance mask at Tributary interface (2M series)
Values of jitter and wander tolerance mask at Tributary interface (2M series):
Interface Peak-to-peak jitter & wander value Frequency (Hz)
rate
A0 A3 A1 A2 F0 F10 F9 F8 F1 F2 F3 F4
2M 36.9(18 s) 18 1.5 0.2 −5 * * * 20Hz 2.4kHz 18kHz 100kHz
1.2×10 Hz
34M 618.6(18 s) * 1.5 0.15 * * * * 100Hz 1kHz 10kHz 800kHz
140M 2506.6(18 s) * 1.5 0.075 * * * * 200Hz 500Hz 10kHz 3500kHz
Peak-to-peak jitter and wander
amplitude (log scale)
A0
A3
A4
Jitter frequency
(log scale)
f0 f12 f 11 f 10 f9 f8 f1 f2 f3 f4 T1817010-92/d02
FIGURE 2/G.825
Lower limit of maximum tolerable input jitter and wander
Note: This mask was specified before 1993. The mask after 1993 eliminated the
wander, because the test meter cannot perform wander tolerance test. Therefore,
you can only see the mask after frequency F1 in the meter.
I. Index meaning
原来信号
向前抖的信号
向后抖的信号
Because signals are influenced by system clock, chip threshold, etc., output data
will shift forwards and backwards. When the fore-and-aft shifting frequency is
bigger than 10HZ, the phenomenon is considered as a jitter. High amount of jitter
will have negative effects on the downstream station.
Measurement unit of jitter is UI. UI is the reciprocal of optical transmission bit
rate..
1
1.5M: UI= 1。5M =647.3ns
1
2M: UI= 2M =488ns
1
34M: UI= 34M =29.1ns
1
45M: UI= 45M =22.34ns
1
140M: UI= 140M =7.18ns
1
155M: UI= 155M =6.43ns
I. Index meaning
The stuffed bits and overhead are removed from the signal at the SDH/PDH
border in order to restore tributary signals, thus leaving a gap. The jitter
introduced in this process is called tributary mapping jitter.
I. Index implication
As the pointer is adjusted in the unit of a single byte or 3 bytes, such phase jump
may produce considerable jitter and wander at the SDH/PDH border.
T1
a指针序列
T2 T3
b指针序列
T2
c指针序列
T3
T1
d指针序列
T3
I. Index meaning
SEC output frequency accuracy should be higher than 4.6×10-6 under TM and
ADM free running status.
I. Index meaning
Pull-in range is the maximum frequency width of locked input timing signals that
can be obtained by the clock. If the clock is locked with the input timing signals,
the maximum frequency width that can hold this locked input timing signals is
pull-out range.
The minimum pull-in range is ±4.6×10-6. The pull-out range is also ±4.6×10-6.
I. Index meaning
When the external timing source is interrupted, SEC can keep a clock accuracy
no worse than 0.37×10-6 (between 20ºc and 30ºc) for a period of 24 hours.